.. / AlwaysInstallElevated
Star

Windows installer files (also known as .msi files) are used to install applications on the system. They usually run with the privilege level of the user that starts it. However, these can be configured to run with higher privileges from any user account (even unprivileged ones). This could potentially allow us to generate a malicious MSI file that would run with admin privileges.

Command Reference:

C:\Windows\Temp\malicious.msi: malicious msi containing, for example, reverse shell
Command: Copy Extra code: Copy References:

https://dmcxblue.gitbook.io/red-team-notes/privesc/unquoted-service-path